weird dream about concentration camp gassing (and George Washington)

ill write this down before I forget it: this morning’s dream.

In the dream I am explaining that there is little difference in spirit between George Washington’s plantation (a place you are worked to death, raped for breeding and generally oppressed by terroristic white overseers and their nazi bosses making money from race slavery) and Belsen. The essence is the same: mass murder (by forced labor). There is no out given to Washington (oh he was nice and freed his house slaves after his death).

A group of students then go on a field trip, in a giant  trailer that flys through the sky (in England). They fly over and in where the next group of reprobates are to be gassed, since society has returned to gassing folks. They are quite nonchalant about the whole experience, as they expect folks to be gassed (since its normal .. and they are not in the gassing class).

You know its a dream because as the trailer full of older students flys – like a 747 – two of the students are outside, like a couple of elves on santas sleigh. But in the dream its normal to be outside at 30k feet!

Well its normal until, as the “plane” is flying  over its route and banking at the Isle of White (where some military area is seen, according to the announcer), the sleigh riders start to zombify. They are being gassed (and it happens just before the rest of the class are gassed in the flying rv). Yes its an accident. The flying protocol was mistakenly set as a gassing class ride.

Im flying on the next ride, and as we get on we see body parts being handled as the ride is being prepared – evidence of the last gassing run. On the trip, I and others remark and how unfortunate it is that the wrong group get gassed – specially as they were all well heeled, private school students from wealthy families. But… here we are on the same trip – in a nazi society that has accepted such things as normal.

ok. so I know why these themes come up in the dream – given certain recent reality events that are still present in recently-augmented memory. But its still fascinating to see how the brain concocts a mis-reality  given the limited ability of memory and cognition to cooperate as the chemistry of the brain areas each return from sleep state.

Advertisements
Posted in coding theory

Crypto in short…

when we put random dots on a unit sphere and measure the distance from the origin (0,0,0), we find that the distance is always 1. But if we were to project that onto a 2D space, the distance would be less than or equal to 1. This same truth holds when we expand the dimensions. For instance, if we expanded our set from 3 dimensions to 4, it would be greater than or equal to 1. This inability to center in on a consistent distance is what breaks distance-based models, because all of the data points become chaotic and move away from one another.

Not me!

Posted in coding theory

trial open live writer

image

Image | Posted on by

How to Make a VR Game With Unity and Google Cardboard

https://www.raywenderlich.com/116805/make-vr-game-unity-google-cardboard

Posted in coding theory

fixing vr app

youll be lucky, speaking in sept 2017, to https://hackernoon.com/how-to-make-a-vr-app-with-zero-experience-927438e2dede

I fixed the FIRST BIT OF bit rot by replacing no-longer available cardboard sdk imports with an import of the relevant assets from the (older) cardboard unity project… also mentioned in the article. I say “import” – but in reality I used windows explorer to drag/drop the cardboard folder from its source to the assets directory of the unity project.

Capture

with that you can at least wander around the scene in the PC unity’s play mode.

Posted in coding theory

Classifying a web page about fridge

Posted in coding theory
Posted in coding theory

odt linking trial

blog

which is terrible

Posted in coding theory

How to Make a VR Game With Unity and Google Cardboard

Posted in coding theory

Ubuntu Forums

Posted in coding theory

Routine non-criminal immigration enforcement operations will not be conducted at evacuation sites, or assistance centers such as shelters or food banks,” it said.

Which means everything else ice does is handled at those relief sites…

And that is every deportee (who returned).

so the rumor is true. Ice will use this as a funnel (for the felon-to-be class). And that’s a lot of folk.

At a policy level I cannot disagree. At a practice level, ice have to do better in leveling. The storm shelter program and red cross Assistance is just another tool (to keep roundup costs low and ice staff safety high).

Posted in coding theory

Could Trump pardon Joe Arpaio by tweet? – BBC News

Ok Michael Baum

What did you do !!

Posted in coding theory

Uc unity


See http://catlikecoding.com/unity/tutorials/procedural-grid/

Posted in coding theory

Evidence of Washoe school district trumpist staff racism

Spanish springs.

Just sad. As in trump sad. But very very American. 

Posted in coding theory

slides-of-loci/README.md at master · agostontorok/slides-of-loci · GitHub

Posted in coding theory

Course materials

http://www-bcf.usc.edu/~tbrun/Course

Posted in coding theory

Candy Crush’s Acquisition And What It Means For Mobile Gaming Companies — Mahesh VC

Posted in coding theory
Posted in coding theory

What is a Pre-money valuation and Post-money valuation?

http://startuplawyer.com/venture-capital/pre-money-and-post-money-valuation

Posted in coding theory

Trump says he has no ‘tapes’ of Comey conversations – The Washington Post

Which makes no statement about whether someone else does.

It’s like me sayin there are no tapes of my phone and I made none knowing full well NSA tapes everything on my phone and died the taping).

But “i” don’t do it

Classic American disinformation

Posted in coding theory

turings quaterion group wired rotor and Cliff of grade=2

document

2017-06-22 10_03_28-The-quaternion-group-and-modern-physics-Girard.pdf and 9 more pages ‎- Microsoft

Posted in coding theory

How Do You Value A Three-Year-Old Company With A 100-Year Ambition?

Posted in coding theory

http://www.latimes.com/business/technology/la-fi-tn-la-tech-20170221-story.html

Posted in coding theory

http://www.latimes.com/business/technology/la-fi-tn-la-tech-20170221-story.html

Posted in coding theory

http://blog.indeed.com/2017/01/10/video-game-labor-snapshot/

Posted in coding theory

Fanciful des

Periods doubling due to non linear feedback is standard fare. But now advance you thinking and view the non linear component of des (and any feistel cipher) as composing two digital streams to create a non linear mathematical medium , for fabricating the theoretical Boolean function that maximizes non linearity.

View the outer bits of the nibble widths box as a third input to the medium that is subject to phase inversion, as a mathematical Kerr effect doubles and triple the balancedness … which drives the number of times the inner bits are inverted. That is data driven computation of the symmetric and asymmetric spin similarity and difference, applied to mixing the round function.

It n feistel analysis term, we are amplifying the rate of confusion per bit in proportion to the information content

Tempting to see this as a repelling  process. But once you add the wider Hamiltonian cycles of the p&s with the balacedness generator you get more of  chaotic attractor for those (theoretical) bent functions.

Now Turing already taught us to generate custom operator norms, that evolve with the plaintext information content. Using the  similarity/dissimilarity basis of the quaternion algebra to tease out the information and use it to generate a data-aware averaging norm that is a masks to  both linear and differential comparators, one gets self evolving computation of an operator norm that generates a bent function.
With the feistel network and the des era spn the complexity goes beyond the limit available with a simple sequence of rotors with quaternion group wiring. One gets now to tangent spaces of much finer granularity.

Posted in coding theory

Trump and Comey are no Henry and Becket (opinion) – CNN.com

Who are the four knights in America?

Nsa head – Henry’s spymaster (domestic and foreign)

Cia head – Henry’s assassin and torturer

Fbi – Henry’s secret police (for nobles)

Irs – Henry tax collector

Given Washington’s intentional creation of a slaving state, one should see north america in medieval terms (Canada and modern Mexico aside)

Speaking as a vassal.

Posted in coding theory

Beware family first chiropractors

For a high end brand, doing excellent  chiropractic care, its sad.

Sad as in scientology sad.

Don’t be duped on the corporate practices in (non insurance)  billing.

It was interesting how for six weeks folks lied (badly for the most part). Finally a matured sailor fessed up, a bit like the scientologist finally admitting to the theory of aliens taking over the planet (in order to work a familyfirst insurance non billing scam).

Did I say that I love family first’s chiro methods?  I can even live with the hardsell (its bot worse than orthopedics hard sell) . I cannot live with the intent to deceive the off plan insurance cases though.

Amazing that a profitable brand has not found it it the right time to ban the internal practice, though. 

Posted in coding theory

Fischer info 

I’m not the likeliest fool doing crypto. But when you goto a uni whose cs dept (of which you are a member) is part of a distinguished stats dept, and half the fathers of your co-stufents work at gchq (or the Singapore equivalent), then its no small wonder you get “invested” in cryptanalysis.

“Thus, the Fisher information may be seen as the curvature of the support curve (the graph of the log-likelihood). 

Near the maximum likelihood estimate, low Fisher information therefore indicates that the maximum appears “blunt”, that is, the maximum is shallow and there are many nearby values with a similar log-likelihood. Conversely, high Fisher information indicates that the maximum is sharp.”

So what dat all mean , I say?

That support is just log likelihood is the first take away
That max has a couple of variant cases is the next. Read carefully.

Posted in coding theory

Likelihood, frequency and information

Turing understood the critical differences between the terms in the title. And he understood their differences relevance to the design of cryptanalysis methods.

We already saw how in affine combination spaces one can calculate likelihood functions in terms of log addition. That is, calculate in the algebra of likelihoods (rather than in the algebra of frequency probabilities).

Any  gambler should know that in a run of similar results that there is , despite the run, no memory property in the frequencies observed. Thus likelihood is clearly distinguished from frequency.
But what is information and how did Turing apply it to cryptanalysis – knowing it to be yet further distinguished from probabilities and likelihoods both?

The answer lies in the Monte Carlo example. While an unbiased but unbalanced  roulette wheel may offer exploitable information about the frequencies observed (the outcomes) it still does not change the likelihood of any particular event.

so what is the exploit value of information?

In the roulette wheel case, it tells you how long you must play the runs before the unbalacedness will show up in the statistics … And improve your return.

The property tells one something about the underlying mechanisms – generating the likelihoods. It tells one about the underlying group and its symmetries ;or lack thereof) used to generate a run, rather than run properties. In roulette  wheel terms, it tells about unbalancedness of its mechanics.

In modern cipher design one learns about those boolean functions which are both balanced and non linear (being at a distance as far as possible from specifically affine combination functions.)

Or in pure information science terms, there must be no information from the run about the generators of the likelihoods.

And just as there must be no information flow from the product about the design So there must be no further meta information from the design about the designers (and their intellectual background). The secret of the cipher is not in the algorithm but in how the design impacts complexity.

The easiest way to think about information is to think about the complexity of the machine needed to compute the probability space. Known in the 1930, folks designs ciphers to need more compute power than was available – as measured by the information properties.

Now apply that to 1970s des where dengineers designed resistance to only a certain quantity of mechanical 

The last point to note is that the tractability of non linear mappings of spaces (that appear to resist diffrential cryptanalysis) can depend on whether they are generated by linear like vector spaces (keyed by cryptographic parameters). Just as the exponential map links probability spaces to likelihood spaces, so lie groups are related to lie algebras through the exponentiation of (lie) matrices

Posted in coding theory